Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for carrying out vulnerability early warning aiming at large-scale target

A large-scale, loophole technology, applied in the direction of instrumentation, electrical digital data processing, platform integrity maintenance, etc., can solve problems such as insufficient performance, excessive system scheduling overhead, etc., and achieve the effect of improving the speed of early warning

Inactive Publication Date: 2018-03-06
北京知道未来信息技术有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, using multi-threading technology, when it comes to large-scale concurrent connections, using threads as processing units, the overhead of system scheduling is still too large
When the number of connections is large, a large number of threads are required for processing. In this way, most of the threads will be idle, and the system will continue to switch contexts, and the performance is not high enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out vulnerability early warning aiming at large-scale target
  • Method for carrying out vulnerability early warning aiming at large-scale target
  • Method for carrying out vulnerability early warning aiming at large-scale target

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0077] A new vulnerability has recently emerged online, which is assumed to be a "Heartbleed vulnerability."

[0078] https: / / baike.baidu.com / item / Heartbleed / 13580882? fr=aladdin&fromid=13579697&fromtitle=Heartbleed

[0079] First, obtain the detailed information of the vulnerability, study the repair scheme of the vulnerability, and develop the detection tool for the vulnerability.

[0080] The "Send Request and Receive Response" system for large-scale targets, combined with the "Heartbleed Vulnerability" vulnerability detection tool, develops a batch "Heartbleed Vulnerability" detection system for large-scale targets.

[0081] It is assumed that the target to be detected is the Internet network equipment in the whole of Beijing, that is, the IP addresses on the Internet in the whole of Beijing are the targets to be detected. There are more than 50 million IP addresses in Beijing, and these more than 50 million IP addresses are all targets to be detected.

[0082] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for carrying out vulnerability early warning aiming at a large-scale target. The method comprises the following steps that: for a target vulnerability, obtaining the vulnerability detailed information of a target vulnerability, and formulating the vulnerability detection tool of the target vulnerability; on the basis of a coroutine technology, creating a request sending and receiving response system which aims at the large-scale target, then, combining with the vulnerability detection tool to create mass vulnerability detection systems which aim at the large-scale target, and obtaining a target list which has the target vulnerability, wherein the request sending and receiving response system is provided with a plurality of processes, each process is provided with a main thread and a plurality of coroutines for processing a plurality of received requests in parallel and responding to data package contents, and the mass vulnerability detection systems areused for receiving the detection tasks of a plurality of targets to be detected and obtaining the target list which contains the target vulnerability; and on the basis of the vulnerability detailed information of the target vulnerability, vulnerability early warning information is generated. Speed of vulnerability detection, which aims at the large-scale target, can be greatly improved.

Description

technical field [0001] The invention belongs to the technical field of computer network security, and relates to a coroutine-based method for early warning of loopholes for large-scale targets. Background technique [0002] A process is a running activity of a program in a computer on a certain data set. It is the basic unit for system resource allocation and scheduling, and the basis of the operating system structure. [0003] A thread is an entity in a process, which is the basic unit independently scheduled and dispatched by the system. A thread itself does not own system resources, but only a few resources that are essential for running. However, it can share the process with other threads belonging to the same process. All resources owned. [0004] Multithreading refers to running multiple threads simultaneously in a single program to complete different tasks. Multiple threads are relatively independent and have their own contexts, and the switching is controlled by t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 练晓谦
Owner 北京知道未来信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products